Skip to main content
Cybersecurity News Kinetic Potential

Threat Actor Targeting VPN Users in New Credential Theft Campaign

A threat actor tracked as Storm-2561 has been targeting VPN users in a new credential theft campaign, Microsoft reports.

Active since at least May 2025, Storm-2561 is known for using search engine optimization (SEO) poisoning for malware distribution and for impersonating popular software vendors to attract victims to malicious websites.

The newly observed campaign started in mid-January, aimed at luring individuals looking for VPN software into downloading trojans that have been signed with a legitimate digital certificate to evade detection.

Not only did the threat actor abuse users’ trust in search engine rankings, but they also hosted the malicious payloads on GitHub repositories, further increasing the chances of successful infections.

In the repositories associated with the campaign, which have been removed, Storm-2561 hosted a ZIP file containing an MSI installer file posing as the legitimate VPN software Pulse Secure.

Using SEO poisoning, the threat actor ensured that victims searching for ‘Pulse VPN download’ or ‘Pulse Secure client’ would receive malicious results at the top of the search page. Other brands were also impersonated as part of the campaign, Microsoft says.

Users clicking on a poisoned result were taken to a malicious download website, but the payload was served as the ZIP archive fetched from GitHub.

During installation, the MSI inside the ZIP file sideloaded a DLL to drop and launch a variant of the Hyrax information stealer that would collect URI and VPN credentials and exfiltrate them to an attacker-controlled command-and-control (C&C) server.

Both the MSI and the DLL were signed with a valid certificate from Taiyuan Lihua Near Information Technology Co., Ltd., which has since been revoked. Other files signed with the same certificate were also identified, all posing as VPN applications.

The fake VPN client installed in this attack mimicked the legitimate application, displaying a GUI that prompted the victim to introduce their credentials. The login information was immediately sent to the attacker’s C&C server.

The MSI installed was also observed establishing persistence through the Windows RunOnce registry key by adding the fake VPN application to startup.

After collecting the victims’ credentials, the fake software displayed an installation error message, providing instructions on how to download the legitimate Pulse VPN client, and, in certain instances, opening the browser to the legitimate VPN website.

“If users successfully install and use legitimate VPN software afterward, and the VPN connection works as expected, there are no indications of compromise to the end user. Users are likely to attribute the initial installation failure to technical issues, not malware,” Microsoft notes.

This article was published by Security Week. Please check their website for the original content.

Add new comment

Plain text

  • No HTML tags allowed.
  • Lines and paragraphs break automatically.
  • Web page addresses and email addresses turn into links automatically.
CAPTCHA This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
8 + 8 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.